Hacker Highschool_ Lesson 1 Being a Hacker.pdf
(
233 KB
)
Pobierz
LESSON 1
BEING A HACKER
LESSON 1 – BEING A HACKER
“License for Use” Information
The following lessons and workbooks are open and publicly available under the following
terms and conditions of ISECOM:
All works in the Hacker Highschool project are provided for non-commercial use with
elementary school students, junior high school students, and high school students whether in a
public institution, private institution, or a part of home-schooling. These materials may not be
reproduced for sale in any form. The provision of any class, course, training, or camp with
these materials for which a fee is charged is expressly forbidden without a license including
college classes, university classes, trade-school classes, summer or computer camps, and
similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at
www.hackerhighschool.org/license.
The HHS Project is a learning tool and as with any learning tool, the instruction is the influence
of the instructor and not the tool. ISECOM cannot accept responsibility for how any
information herein is applied or abused.
The HHS Project is an open community effort and if you find value in this project, we do ask
you support us through the purchase of a license, a donation, or sponsorship.
All works copyright ISECOM, 2004.
2
LESSON 1 – BEING A HACKER
Table of Contents
“License for Use” Information..................................................................................................................
2
Contributors................................................................................................................................................
4
1.0 Introduction..........................................................................................................................................
5
1.1 Resources..............................................................................................................................................
6
1.1.1 Books..............................................................................................................................................
6
1.1.2 Magazines and Newspapers......................................................................................................
7
1.1.3 Zines and Blogs.............................................................................................................................
7
1.1.4 Forums and Mailing Lists..............................................................................................................
8
1.1.5 Newsgroups...................................................................................................................................
8
1.1.6 Websites.........................................................................................................................................
9
1.1.7 Chat.............................................................................................................................................
10
1.1.8 P2P................................................................................................................................................
11
1.2 Further Lessons....................................................................................................................................
11
3
LESSON 1 – BEING A HACKER
Contributors
Pete Herzog, ISECOM
Chuck Truett, ISECOM
Marta Barceló, ISECOM
Kim Truett, ISECOM
4
LESSON 1 – BEING A HACKER
1.0 Introduction
Welcome to the Hacker Highschool program! This program is designed to encourage you to
be well-rounded and resourceful. The core instruction theme is to harness the hacker curiosity
in you and to guide you progressively through your hacker education to help you grow into a
responsible role, capable of determining security and privacy problems and making proper
security decisions for yourself.
While there is a thrill to hacking partly because of the illegal nature of computer trespass, we
want to show you that it is just as big a thrill to alert others about lapses in security and make
them public without worrying about going to jail over it. As a citizen of most countries, it is not
only your right, but your responsibility, to report security and privacy leaks to the proper
authorities. You do this not because you can, but because many other people can't. You
are helping those who can't help themselves. This is what watchdog groups do. This is what
you will learn to do.
5
Plik z chomika:
jacek_040
Inne pliki z tego folderu:
Exploiting Web-Based Applications - FREE Video Training Course PART 1.rar
(506812 KB)
Exploiting Web-Based Applications - FREE Video Training Course PART 2.rar
(933817 KB)
50 Android Hacks.pdf
(3465 KB)
50 Reasons For Mastering Penetration Testing.azw3
(171 KB)
610.1 - Malware Analysis Fundamentals.pdf
(31650 KB)
Inne foldery tego chomika:
Zgłoś jeśli
naruszono regulamin